{"id":5702,"date":"2025-11-07T02:34:07","date_gmt":"2025-11-07T02:34:07","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=5702"},"modified":"2025-11-07T02:34:07","modified_gmt":"2025-11-07T02:34:07","slug":"malicious-npm-packages-contain-vidar-infostealer","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=5702","title":{"rendered":"Malicious npm packages contain Vidar infostealer"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Malicious code continues to be uploaded to open source repositories, making it a challenge for responsible developers to trust what\u2019s there, and for CISOs to trust applications that include open source code.<\/p>\n<p>The latest example comes from researchers at Datadog Security, who said that last month they found 17 packages (23 releases) in the <a href=\"https:\/\/securitylabs.datadoghq.com\/articles\/mut-4831-trojanized-npm-packages-vidar\/\" target=\"_blank\" rel=\"noopener\">npm repository that contained downloader malware<\/a> for Windows systems that executes via a postinstall script.<\/p>\n<p>The associated packages masquerade as Telegram bot helper packages, icon libraries, or legitimate-seeming forks of preexisting projects such as Cursor and React. They provide legitimate functionality, but their actual goal is to execute the Vidar infostealer malware on the victim system. Datadog believes this is the first public disclosure of Vidar malware being delivered via npm packages.<\/p>\n<p>Both of the accounts offering these packages (aartje\u00a0and<strong>\u00a0<\/strong>saliii229911 ) have since been banned. However, they were on the registry for about two weeks, and the malicious packages were downloaded at least 2,240 times. However, the researchers believe many of those downloads were likely by automated scrapers, with some occurring after the packages had been removed and replaced with empty security holding packages.<\/p>\n<h2 class=\"wp-block-heading\">All sorts of nasty things<\/h2>\n<p>Malicious compromise of open source components can lead to all sorts of nasty things. First, threat actors can steal developers\u2019 credentials and insert backdoors into their code. Second, the malicious code in the downloaded component itself could spread around the world to the developer\u2019s customers.<\/p>\n<p>The Datadog discovery is just another in a long list of malicious code uploaded to npm, PyPI, GitHub, and other open source repositories.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/4082195\/malicious-packages-in-npm-evade-dependency-detection-through-invisible-url-links-report.html\" target=\"_blank\" rel=\"noopener\">Last week, Koi Security reported<\/a> finding 126 malicious packages in npm, and in September, <a href=\"https:\/\/www.csoonline.com\/article\/4058059\/warning-hackers-have-inserted-credential-stealing-code-into-some-npm-libraries.html\" target=\"_blank\" rel=\"noopener\">researchers at Step Security reported<\/a> that dozens of npm libraries had been replaced with credential stealing code. The same month, <a href=\"https:\/\/www.csoonline.com\/article\/4053725\/massive-npm-supply-chain-attack-hits-18-popular-packages-with-2b-weekly-downloads.html\" target=\"_blank\" rel=\"noopener\">researchers at Aikido reported<\/a> that 18 highly popular and highly downloaded npm packages had been contaminated.<\/p>\n<p>\u201cI don\u2019t know how to easily solve this problem without requiring a full security view of any newly submitted code, and that\u2019s not fast, cheap, or easy,\u201d commented <a href=\"https:\/\/www.knowbe4.com\/press\/roger-grimes-joins-knowbe4-as-data-driven-defense-evangelist\" target=\"_blank\" rel=\"noopener\">Roger Grimes<\/a>, digital defence CISO advisor at KnowBe4.<\/p>\n<p>\u201cBut it really is the only answer if you want reliable, safe, open source code.\u201d<\/p>\n<p>Ironically, he said, one of the biggest reasons given for the world to use open source code is that it\u2019s readily reviewable, so anyone can look at it to see and stop vulnerabilities. \u201cBut the reality is that almost no one security reviews any of the tens of millions of lines of open source code,\u201d he pointed out. <\/p>\n<p>\u201cThere have been dozens of open source projects that attempted to implement more default code review and all have failed,\u201d he said. \u201cOne of my favorite related quotes of all time is, \u2018Asking for users to review open source code before using is like asking passengers of an airliner to step outside the jet and review it for flight safety before they fly.\u2019 I\u2019m not sure who said that first, but it\u2019s a brilliant summary of why volunteer open source code review really doesn\u2019t work.\u201d<\/p>\n<h2 class=\"wp-block-heading\">Typosquatting<\/h2>\n<p>One favorite tactic of threat actors trying to infect the open source software supply chain is typosquatting, the creation of packages with names similar to those of legitimate ones to trick unwitting developers searching for a particular library. For example, in 2018 a researcher found that <a href=\"https:\/\/bertusk.medium.com\/detecting-cyber-attacks-in-the-python-package-index-pypi-61ab2b585c67\" target=\"_blank\" rel=\"noopener\">threat actors had created phony libraries in the Python repository<\/a> called \u2018diango,\u2019 \u2018djago,\u2019 \u2018dajngo,\u2019 to dupe developers seeking the popular \u2018django\u2019 Python library.<\/p>\n<p>CISOs should ensure that employees are educated about the issue of typosquatting and learn what to look for. IT departments should keep a comprehensive inventory of what components are used by all approved software against which audits can be conducted, to ensure only approved components are in place. This inventory and audit should be performed to validate any new components that are introduced.<\/p>\n<h2 class=\"wp-block-heading\">What more to do?<\/h2>\n<p>There\u2019s no shortage of advice for developers and IT and infosec leaders to help them avoid being victimized by malicious packages in open source repositories.<\/p>\n<p>One tactic is to include a <a href=\"https:\/\/www.csoonline.com\/article\/573185\/what-is-an-sbom-software-bill-of-materials-explained.html\" target=\"_blank\" rel=\"noopener\">software bill of materials<\/a> in every application an IT department acquires. With it, the DevOps\/DevSecOps teams can track software components, identify vulnerabilities, and ensure compliance.\u00a0<\/p>\n<p>In 2021, the US Cybersecurity and Infrastructure Security Agency (CISA) and the US National Institute for Standards and Technology (NIST) published an advisory, <a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/defending_against_software_supply_chain_attacks_508.pdf\" target=\"_blank\" rel=\"noopener\"><em>Defending Against Software Supply Chain Attacks<\/em>, <\/a>providing advice for creating secure open source apps. It starts with the creation of a formal supply chain risk management program to ensure that supply chain risk receives attention across the organization, even among executives and managers within operations and personnel across supporting roles, such as IT, acquisitions, legal, risk management, and security.<\/p>\n<p>An organization can reduce its software attack surface through configuration management, the advisory says, which includes:<\/p>\n<p>placing configurations under change control;<\/p>\n<p>conducting security impact analyses;<\/p>\n<p>implementing manufacturer-provided guidelines to harden software, operating systems, and firmware;<\/p>\n<p>\u2022 maintaining an information system component inventory.<\/p>\n<p>In addition, the Open Source Web Application Security Project (OWASP) offers this advice to developers using npm:<\/p>\n<p>always vet and perform due diligence on third-party modules that you install to confirm their health and credibility;<\/p>\n<p>hold off on immediate upgrades to new versions; allow new package versions some time to circulate before trying them out.<\/p>\n<p>before upgrading, make sure to review changelogs and release notes for the upgraded version.<\/p>\n<p>when installing packages, make sure to add the\u00a0<em>ignore-scripts<\/em>\u00a0suffix to disable the execution of any scripts by third-party packages.<\/p>\n<p>consider adding\u00a0<em>ignore-scripts<\/em>\u00a0to the\u00a0.npmrc\u00a0project file, or to the global npm configuration.<\/p>\n<p>Finally, <a href=\"https:\/\/www.andrewkrug.com\/bio\/\" target=\"_blank\" rel=\"noopener\">Andrew Krug<\/a>, Datadog\u2019s head of security advocacy, offered these additional tips:<\/p>\n<p>give developers the ability to install real-time package scanning at installation;<\/p>\n<p>guard against typosquatting and dependency confusion by prioritizing the use of internal package repositories as a guardrail for approved packages;<\/p>\n<p>maintain software bills of materials;<\/p>\n<p>Deploy SCA (software composition analysis) at every phase of the software development lifecycle. Traditional SCA tools only periodically analyze code snapshots, he said, but effective detection must be complemented with real-time visibility into deployed services, including production, to reprioritize issues and focus on those exposed in sensitive environments.<\/p>\n<p><em>This article originally appeared on <a href=\"https:\/\/www.infoworld.com\/article\/4086337\/malicious-npm-packages-contain-vidar-infostealer.html\" target=\"_blank\" rel=\"noopener\">InfoWorld<\/a>.<\/em><\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Malicious code continues to be uploaded to open source repositories, making it a challenge for responsible developers to trust what\u2019s there, and for CISOs to trust applications that include open source code. The latest example comes from researchers at Datadog Security, who said that last month they found 17 packages (23 releases) in the npm [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":5703,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-5702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5702"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5702"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5702\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/5703"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}